A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "2.2.0-10ubuntu2.6+esm1",
"binary_name": "libopenexr-dev"
},
{
"binary_version": "2.2.0-10ubuntu2.6+esm1",
"binary_name": "libopenexr22"
},
{
"binary_version": "2.2.0-10ubuntu2.6+esm1",
"binary_name": "openexr"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.2.0-11.1ubuntu1.7",
"binary_name": "libopenexr-dev"
},
{
"binary_version": "2.2.0-11.1ubuntu1.7",
"binary_name": "libopenexr22"
},
{
"binary_version": "2.2.0-11.1ubuntu1.7",
"binary_name": "openexr"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "2.3.0-6ubuntu0.5+esm1",
"binary_name": "libopenexr-dev"
},
{
"binary_version": "2.3.0-6ubuntu0.5+esm1",
"binary_name": "libopenexr24"
},
{
"binary_version": "2.3.0-6ubuntu0.5+esm1",
"binary_name": "openexr"
}
]
}